IDENTIFY CONTROL SECURITY TYPES Flashcards

(27 cards)

1
Q

What is the focus of this section in the CySA+ course?

A

Identifying security control types within Domain 2: Vulnerability Management, specifically Objective 2.5 - explaining concepts related to vulnerability response, handling, and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the first topics covered in this section?

A

The different roles and responsibilities associated with cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the Security Operations Center (SOC) in cybersecurity?

A

The SOC integrates into an organization’s overall security structure to monitor, detect, and respond to cybersecurity threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What framework is discussed in this section?

A

NIST Special Publication 800-53, which provides a catalog of security and privacy controls for US federal information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is NIST SP 800-53 relevant to CySA+?

A

It includes testable control categories that are part of the CySA+ exam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of selecting security controls?

A

To mitigate vulnerabilities and enforce the confidentiality, integrity, and availability (CIA) of systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does this section conclude?

A

With a short quiz reviewing key concepts and explanations for each question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some common roles in cybersecurity?

A

Cybersecurity Analyst, Specialist/Technician, Cybercrime Investigator, Incident Response Analyst, Penetration Tester, Engineer, and Chief Information Security Officer (CISO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary role of a Cybersecurity Analyst?

A

To protect sensitive information and prevent unauthorized access to electronic data and systems. They serve as network defenders responsible for securing various devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between a Junior and Senior Cybersecurity Analyst?

A

Junior analysts typically have 2-4 years of experience in IT/security roles before being promoted. Senior analysts oversee junior analysts and report to security managers or CISOs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of the Chief Information Security Officer (CISO)?

A

The CISO is a senior executive responsible for governance, risk management, and leading cybersecurity strategy within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What security functions might a cybersecurity analyst perform?

A

Implementing/configuring security controls (firewalls, IDS), working in a SOC, conducting risk and vulnerability assessments, responding to incidents, and maintaining threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a Security Operations Center (SOC)?

A

A SOC is a centralized unit that continuously monitors and analyzes security threats to detect and respond to cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Computer Security Incident Response Team (CSIRT)?

A

A CSIRT is responsible for responding to cybersecurity incidents, such as data breaches and attacks, to mitigate their impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of assessments might a cybersecurity analyst conduct?

A

Risk assessments, vulnerability assessments, and penetration tests to identify and mitigate security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is threat intelligence important for cybersecurity analysts?

A

Threat intelligence helps analysts stay updated on evolving threats, enabling them to implement appropriate countermeasures to protect their organization.

17
Q

What are the key qualities of a good cybersecurity analyst?

A

Creative thinking and problem-solving skills, ability to analyze security threats, and effectively communicate findings to both technical and non-technical audiences.

18
Q

Why is communication important for cybersecurity analysts?

A

Analysts must explain security issues and solutions to senior management in non-technical terms to ensure proper risk management decisions.

19
Q

How do you select the appropriate security controls for a system?

A

By considering the CIA Triad (Confidentiality, Integrity, Availability) to ensure full security coverage.

20
Q

What security principle is upheld by encryption?

A

Confidentiality - encryption ensures that unauthorized users cannot access sensitive data.

21
Q

What security principle is upheld by digital signatures?

A

Integrity - digital signatures verify that data has not been altered.

22
Q

What security principle is upheld by scalable cloud computing?

A

Availability - cloud elasticity ensures resources are available to meet demand.

23
Q

Why is it important to combine multiple security controls?

A

No single control ensures Confidentiality, Integrity, and Availability (CIA) - a layered approach is needed.

24
Q

How can you improve confidentiality in a backup system?

A

By implementing encryption or access control systems to restrict unauthorized access.

25
What is the role of a cybersecurity analyst in security control selection?
To evaluate vulnerabilities and risks, then select controls that best mitigate those risks using the CIA model.
26
What are some security controls that improve both availability and integrity?
Backups (availability) with hashing (integrity) to validate stored data.
27
What is the importance of a risk management framework in selecting security controls?
It helps prioritize risks and apply appropriate security controls systematically.